Investigating the effectiveness of profile injecting attack against recommender system

Verified

Added on  2023/06/15

|7
|821
|226
AI Summary
This study aims to investigate the effectiveness of profile injecting attack against recommender system and examine various vulnerabilities of different recommendation techniques. The design scope intends to concentrate on critical operations undertaken. The major operations include review of attack models, detection of different profile injection attacks and classification of profiles among many others.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: BUSINESS RESEARCH METHODS
Business Research Methods
University Name
Student Name
Authors’ Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2
BUSINESS RESEARCH METHODS
Table of Contents
1.1 Background of the study......................................................................................................2
1.2 Statement of problem...........................................................................................................2
1.3 Aims and objectives.............................................................................................................2
1.4 Significance of the study......................................................................................................4
1.5The Design Scope.................................................................................................................4
2.0 Literature Review.................................................................................................................4
2.1 Attack Model........................................................................................................................4
2.3 Profile Classification............................................................................................................5
3.0 Organization of the design...................................................................................................5
References..................................................................................................................................7
Document Page
3
BUSINESS RESEARCH METHODS
Investigating the effectiveness of profile injecting attack against recommender system
1.1 Background of the study
Collaborative recommender system is referred to as exceedingly susceptible to particularly
profile injection attacks; particularly these hits include inclusion of various predisposed
profiles into ratings of catalogue for altering the specific recommendation behaviour of the
scheme (Yang et al. 2017). Previous work was reflected at the time when profiles are mainly
reverse engineered for the maximizing the influence, yet a small amount of malevolent
outlines can considerably prejudice the entire arrangement.
1.2 Statement of problem
The recommender system becomes a tack of numerous sites for e-commerce, however
considerable susceptibilities are said to be existent in these kinds of systems when
encountered with what is known as “shilling attacks” (Yang et al. 2017). The current study
has the need to identify a specific approach for detection of profile injection attacks with
monitored cataloguing.
1.3 Aims as well as objectives
The current study aims to check up and analyses effectiveness of profile injecting attack
against recommender system. The study also intends to examine various vulnerabilities of
different recommendation techniques. In addition to this, this study also aims to recognize
diverse models of attack, founded on different suppositions regarding knowledge of the
attacker as well as intent.
Document Page
4
BUSINESS RESEARCH METHODS
1.4 Significance of the study
Understanding profile injection attacks can help in understanding effectual threats to on the
whole dynamism of collaborative recommender arrangement. A clear demonstration of the
classifier learning advance can quite precisely differentiate real from data on attack and
restrict the damages caused by the attack (Wang et al. 2015)
1.5The Design Scope
The design scope intends to concentrate on critical operations undertaken. The major
operations include review of attack models, detection of different profile injection attacks and
classification of profiles among many others.
2.0 Literature Review
2.1 Attack Model
An attack model can be regarded as a specific approach that can be used for developing a
contour of attack, founded on awareness as regards recommender arrangement, database on
system of rating, together with products as well as its users (Xia et al. 2015).
2.2 Detection of particularly attacks of profile injection
Essentially main potency of collaborative recommender arrangement is necessarily the ability
of particularly users having atypical tastes to arrive at important propositions by the
arrangement identifying users with identical strangeness. The objective of detection as well
as response is primarily to curtail the influence of the hit and reduce the overall probability of
an unbeaten attack.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
5
BUSINESS RESEARCH METHODS
2.3 Profile Classification
As there is prior knowledge of different types of successful attacks, it is possible to deal with
attack recognition as a traditional pattern categorization issue in which it is important to
categorise profiles as matching acknowledged attack models (Gunes et al. 2014)
3.0 Organization of the design
Chapterone-PresentingbackgroundofthestudyChaptertwo-DealswithreviewofliteraturerelatedtotheprojectChapterthree-ExplainsmethodofanalysisofandresearchmethodologyChapterfour-PresentstheanalysisanddocumentationoftherecordsChapterfive-Summarizingtheprojectanddrawingconclusions
Document Page
6
BUSINESS RESEARCH METHODS
Document Page
7
BUSINESS RESEARCH METHODS
References
Gunes, I., Kaleli, C., Bilge, A. and Polat, H. Shilling attacks against recommender systems: a
comprehensive survey. Artificial Intelligence Review, 42(4), pp.767-799, 2014
Xia, H., Fang, B., Gao, M., Ma, H., Tang, Y. and Wen, J. A novel item anomaly detection
approach against shilling attacks in collaborative recommendation systems using the dynamic
time interval segmentation technique. Information Sciences, 306, pp.150-165, 2015
Wang, Y., Zhang, L., Tao, H., Wu, Z. and Cao, J. A comparative study of shilling attack
detectors for recommender systems. In Service Systems and Service Management (ICSSSM),
2015 12th International Conference on (pp. 1-6), June 2015
Yang, L., Huang, W. and Niu, X. Defending shilling attacks in recommender systems using
soft co-clustering. IET Information Security, 11(6), pp.319-325, 2017
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]